An Improved Algorithm for Network Intrusion Detection Based on Deep Residual Networks

被引:1
作者
Hu, Xuntao [1 ]
Meng, Xiancai [2 ]
Liu, Shaoqing [2 ]
Liang, Lizhen [2 ]
机构
[1] Anhui Univ Sci & Technol, Huainan 232001, Peoples R China
[2] Hefei Comprehens Natl Sci Ctr, Inst Energy, Hefei 230031, Anhui, Peoples R China
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Logic gates; Feature extraction; Intrusion detection; Adaptation models; Convolutional neural networks; Residual neural networks; Data models; Long short term memory; Bidirectional control; residual networks; hybrid attention mechanisms; bidirectional long and short memory networks; AUTHORIZATION USAGE CONTROL; SAFETY DECIDABILITY; INTERNET; THINGS;
D O I
10.1109/ACCESS.2024.3398007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The goal of current research will be to increase the accuracy and generalisation capacity of intrusion detection models in order to better handle the complex network security issues of today. In this paper, a new hybrid attention mechanism is introduced along with an enhanced algorithm. Through the effective channel layer and curve space layer, the feature information will be concentrated on the necessary feature information, allowing the model to concentrate more on the features linked to classification and become more broadly applicable. Increase the model's precision. The experimental results demonstrated that the accuracy can achieve 100%, 99.79%, and 98.10% on binary classification problems and 96.37%, 98.12%, and 99.06% on multiclassification problems, respectively, using the UNSW-NB15, CICIDS-2017, and CICIDS-2018 datasets for validation.
引用
收藏
页码:66432 / 66441
页数:10
相关论文
共 50 条
  • [21] A Self-Attention-Based Deep Convolutional Neural Networks for IIoT Networks Intrusion Detection
    Alshehri, Mohammed S.
    Saidani, Oumaima
    Alrayes, Fatma S.
    Abbasi, Saadullah Farooq
    Ahmad, Jawad
    IEEE ACCESS, 2024, 12 : 45762 - 45772
  • [22] An Improved Feature Selection Algorithm Based on MAHALANOBIS Distance for Network Intrusion Detection
    Zhao Yongli
    Zhang Yungui
    Tong Weiming
    Chen Hongzhi
    2013 INTERNATIONAL CONFERENCE ON SENSOR NETWORK SECURITY TECHNOLOGY AND PRIVACY COMMUNICATION SYSTEM (SNS & PCS), 2013, : 69 - 73
  • [23] Design of Network Attack Intrusion Detection System Based on Improved FWA Algorithm
    Chang, Qingsong
    Feng, Weiyan
    Wang, Xingguo
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (06) : 191 - 200
  • [24] Network Intrusion Detection Method Based on CNN-BiLSTM-Attention Model
    Dai, Wei
    Li, Xinhui
    Ji, Wenxin
    He, Sicheng
    IEEE ACCESS, 2024, 12 : 53099 - 53111
  • [25] Deep Recurrent Neural Network for Intrusion Detection in SDN-based Networks
    Tang, Tuan A.
    Mhamdi, Lotfi
    McLernon, Des
    Zaidi, Syed Ali Raza
    Ghogho, Mounir
    2018 4TH IEEE CONFERENCE ON NETWORK SOFTWARIZATION AND WORKSHOPS (NETSOFT), 2018, : 202 - 206
  • [26] A Physics-Based Hyper Parameter Optimized Federated Multi-Layered Deep Learning Model for Intrusion Detection in IoT Networks
    Chandnani, Chirag Jitendra
    Agarwal, Vedik
    Kulkarni, Shlok Chetan
    Aren, Aditya
    Amali, D. Geraldine Bessie
    Srinivasan, Kathiravan
    IEEE ACCESS, 2025, 13 : 21992 - 22010
  • [27] Performance Study of a Network Intrusion Detection Algorithm Improved by an Optimization Algorithm
    Feng, Wei
    Gao, Hanjun
    Cao, Duan
    International Journal of Network Security, 2022, 24 (05) : 953 - 958
  • [28] Tool Wear Monitoring Based on Transfer Learning and Improved Deep Residual Network
    Zhang, Nan
    Zhao, Jiawei
    Ma, Lin
    Kong, Haoqiang
    Li, Huaqiang
    IEEE ACCESS, 2022, 10 : 119546 - 119557
  • [30] Network Intrusion Detection Using Improved Genetic k-means Algorithm
    Sukumar, Anand J., V
    Pranav, I
    Neetish, M. M.
    Narayanan, Jayasree
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, : 2441 - 2446